<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I changed the DVR IP and in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432026#M267432</link>
    <description>&lt;P&gt;ETA; it is working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I changed the DVR IP and added: (xxx.xxx.xxx.xxx) is the outside interface IP.&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp xxx.xxx.xxx.xxx 8200 192.168.1.52 8200 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) udp xxx.xxx.xxx.xxx 8200 192.168.1.52 8200 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp xxx.xxx.xxx.xxx 8016 192.168.1.52 8016 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) udp xxx.xxx.xxx.xxx 8016 192.168.1.52 8016 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp xxx.xxx.xxx.xxx 8116 192.168.1.52 8116 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) udp xxx.xxx.xxx.xxx 8116 192.168.1.52 8116 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp xxx.xxx.xxx.xxx 10019 192.168.1.52 10019 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) udp xxx.xxx.xxx.xxx 10019 192.168.1.52 10019 netmask 255.255.255.255&lt;BR /&gt;access-list dvr_in permit tcp any host xxx.xxx.xxx.xxx eq 8200&lt;BR /&gt;access-list dvr_in permit tcp any host xxx.xxx.xxx.xxx eq 8016&lt;BR /&gt;access-list dvr_in permit tcp any host xxx.xxx.xxx.xxx eq 8116&lt;BR /&gt;access-list dvr_in permit tcp any host xxx.xxx.xxx.xxx eq 1019&lt;BR /&gt;access-group dvr_in in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was sure I added it correctly before. Maybe not. (I know thw private IP changed)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the assistance, much appreciated&lt;/P&gt;</description>
    <pubDate>Fri, 25 Apr 2014 18:35:04 GMT</pubDate>
    <dc:creator>mppflanigan</dc:creator>
    <dc:date>2014-04-25T18:35:04Z</dc:date>
    <item>
      <title>PIX 515E routing external to internal</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432014#M267418</link>
      <description>&lt;P&gt;I am trying to access my camera DVR from outside my network. I have set static and access-list rules and cannot connect. Can I get some assistance? PIX version 6.3(5)&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:05:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432014#M267418</guid>
      <dc:creator>mppflanigan</dc:creator>
      <dc:date>2019-03-12T04:05:51Z</dc:date>
    </item>
    <item>
      <title>Can you post relevant</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432015#M267419</link>
      <description>&lt;P&gt;Can you post relevant configurations?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2014 20:45:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432015#M267419</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2014-04-17T20:45:22Z</dc:date>
    </item>
    <item>
      <title>Below is the current config</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432016#M267420</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;Below is the current config from before I made changes. I would like to access an internal IP on ports 8200, 8016, 10019 and 8116. I created a static entry;&amp;nbsp;&lt;SPAN style="color: rgb(66, 66, 66); font-family: Tahoma, Arial, sans-serif; line-height: 22px;"&gt;static (inside,outside) tcp xxx.xxx.xxx.xxx&lt;/SPAN&gt;&lt;A href="tel:218%208200%20192" style="color: rgb(17, 85, 204); font-family: Tahoma, Arial, sans-serif; font-size: 14px; line-height: 22px;" target="_blank" value="+12188200192"&gt;&amp;nbsp;192&lt;/A&gt;&lt;SPAN style="color: rgb(66, 66, 66); font-family: Tahoma, Arial, sans-serif; line-height: 22px;"&gt;.168.1.23 8200 netmask 255.255.255.255 but I cannot enter the other ports on the same IP it tells me that it is a duplicate entry. I then created an access rule;&amp;nbsp;access-list outside-inbound permit tcp any host xxx.xxx.xxx.xxx eq 8200.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I would like you to know that I am new at this location and this system has been untouched for roughly 9 years. I have a side question for setting an IP as static from this PIX also.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;PIX Version 6.3(5)&lt;BR /&gt;interface ethernet0 100full&lt;BR /&gt;interface ethernet1 100full&lt;BR /&gt;interface ethernet2 auto shutdown&lt;BR /&gt;interface ethernet3 100full&lt;BR /&gt;interface ethernet4 auto shutdown&lt;BR /&gt;interface ethernet5 auto shutdown&lt;BR /&gt;nameif ethernet0 outside security0&lt;BR /&gt;nameif ethernet1 inside security100&lt;BR /&gt;nameif ethernet2 dmz1 security90&lt;BR /&gt;nameif ethernet3 dmz2 security80&lt;BR /&gt;nameif ethernet4 dmz3 security70&lt;BR /&gt;nameif ethernet5 dmz4 security60&lt;BR /&gt;enable password &amp;nbsp;encrypted&lt;BR /&gt;passwd &amp;nbsp;encrypted&lt;BR /&gt;hostname xxxx-PIX&lt;BR /&gt;domain-name xxxx.com&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;fixup protocol dns maximum-length 512&lt;BR /&gt;fixup protocol ftp 21&lt;BR /&gt;fixup protocol h323 h225 1720&lt;BR /&gt;fixup protocol h323 ras 1718-1719&lt;BR /&gt;no fixup protocol http 80&lt;BR /&gt;fixup protocol rsh 514&lt;BR /&gt;fixup protocol rtsp 554&lt;BR /&gt;fixup protocol sip 5060&lt;BR /&gt;fixup protocol sip udp 5060&lt;BR /&gt;fixup protocol skinny 2000&lt;BR /&gt;fixup protocol smtp 25&lt;BR /&gt;fixup protocol sqlnet 1521&lt;BR /&gt;fixup protocol tftp 69&lt;BR /&gt;names&lt;BR /&gt;name 192.5.41.209 NTP2.USNO.NAVY.MIL&lt;BR /&gt;name 192.168.3.254 AIRONET&lt;BR /&gt;name xxx.xxx.xxx.xxx SITE1&lt;BR /&gt;name xxx.xxx.xxx.xxx SITE2&lt;BR /&gt;access-list mgmt-vpn-client permit ip 192.168.1.0 255.255.255.0 172.16.1.0 255.255.255.0&lt;BR /&gt;access-list mgmt-vpn-client permit ip host AIRONET 172.16.1.0 255.255.255.0&lt;BR /&gt;access-list inside_in permit tcp 192.168.1.0 255.255.255.0 host AIRONET eq ssh&lt;BR /&gt;access-list inside_in permit tcp 192.168.1.0 255.255.255.0 host AIRONET eq 8080&lt;BR /&gt;access-list inside_in deny ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;BR /&gt;access-list inside_in permit ip any any&lt;BR /&gt;access-list dmz2_in deny ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list dmz2_in permit ip any any&lt;BR /&gt;access-list no-nat permit ip 192.168.1.0 255.255.255.0 172.16.1.0 255.255.255.0&lt;BR /&gt;access-list no-nat permit ip host AIRONET 172.16.1.0 255.255.255.0&lt;BR /&gt;access-list outside_in permit icmp any any echo-reply&lt;BR /&gt;access-list outside_in permit icmp any any unreachable&lt;BR /&gt;access-list outside_in permit icmp any any time-exceeded&lt;BR /&gt;pager lines 24&lt;BR /&gt;icmp deny any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz1 1500&lt;BR /&gt;mtu dmz2 1500&lt;BR /&gt;mtu dmz3 1500&lt;BR /&gt;mtu dmz4 1500&lt;BR /&gt;ip address outside xxx.xxx.xxx.xxx 255.255.255.252&lt;BR /&gt;ip address inside 192.168.1.1 255.255.255.0&lt;BR /&gt;ip address dmz1 192.168.2.1 255.255.255.0&lt;BR /&gt;ip address dmz2 192.168.3.1 255.255.255.0&lt;BR /&gt;ip address dmz3 192.168.4.1 255.255.255.0&lt;BR /&gt;ip address dmz4 192.168.5.1 255.255.255.0&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;ip verify reverse-path interface inside&lt;BR /&gt;ip verify reverse-path interface dmz1&lt;BR /&gt;ip verify reverse-path interface dmz2&lt;BR /&gt;ip verify reverse-path interface dmz3&lt;BR /&gt;ip verify reverse-path interface dmz4&lt;BR /&gt;ip audit info action alarm drop reset&lt;BR /&gt;ip audit attack action alarm drop reset&lt;BR /&gt;ip local pool VPN-CLIENTS 172.16.1.1-172.16.1.254&lt;BR /&gt;no failover&lt;BR /&gt;failover timeout 0:00:00&lt;BR /&gt;failover poll 15&lt;BR /&gt;no failover ip address outside&lt;BR /&gt;no failover ip address inside&lt;BR /&gt;no failover ip address dmz1&lt;BR /&gt;no failover ip address dmz2&lt;BR /&gt;no failover ip address dmz3&lt;BR /&gt;no failover ip address dmz4&lt;BR /&gt;no pdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (dmz1) 1 interface&lt;BR /&gt;global (dmz2) 1 interface&lt;BR /&gt;nat (inside) 0 access-list no-nat&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0 0 0&lt;BR /&gt;nat (dmz2) 0 access-list no-nat&lt;BR /&gt;nat (dmz2) 1 192.168.3.0 255.255.255.0 0 0&lt;BR /&gt;access-group outside_in in interface outside&lt;BR /&gt;access-group inside_in in interface inside&lt;BR /&gt;access-group dmz2_in in interface dmz2&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:05:00 rpc 0:10:00 h225 1:00:00&lt;BR /&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:05:00&lt;BR /&gt;timeout sip-disconnect 0:05:00 sip-invite 0:05:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server TACACS+ max-failed-attempts 3&lt;BR /&gt;aaa-server TACACS+ deadtime 10&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server RADIUS max-failed-attempts 3&lt;BR /&gt;aaa-server RADIUS deadtime 10&lt;BR /&gt;aaa-server RADIUS (inside) host 192.168.1.5 53cuR3dNetW0rk5 timeout 10&lt;BR /&gt;aaa-server LOCAL protocol local&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;ntp server NTP2.USNO.NAVY.MIL source outside prefer&lt;BR /&gt;snmp-server location&amp;nbsp;&lt;BR /&gt;snmp-server contact&amp;nbsp;&lt;BR /&gt;snmp-server community&amp;nbsp;&lt;BR /&gt;no snmp-server enable traps&lt;BR /&gt;floodguard enable&lt;BR /&gt;sysopt connection permit-ipsec&lt;BR /&gt;service resetinbound&lt;BR /&gt;service resetoutside&lt;BR /&gt;crypto ipsec transform-set ESP-AES-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto dynamic-map VPN-CLIENT-MAP 10 set pfs group2&lt;BR /&gt;crypto dynamic-map VPN-CLIENT-MAP 10 set transform-set ESP-AES-SHA&lt;BR /&gt;crypto map OUTSIDE-MAP 100 ipsec-isakmp dynamic VPN-CLIENT-MAP&lt;BR /&gt;crypto map OUTSIDE-MAP client authentication LOCAL&lt;BR /&gt;isakmp identity address&lt;BR /&gt;isakmp nat-traversal 20&lt;BR /&gt;isakmp policy 1 authentication pre-share&lt;BR /&gt;isakmp policy 1 encryption aes&lt;BR /&gt;isakmp policy 1 hash sha&lt;BR /&gt;isakmp policy 1 group 2&lt;BR /&gt;isakmp policy 1 lifetime 86400&lt;BR /&gt;vpngroup MGMT address-pool VPN-CLIENTS&lt;BR /&gt;vpngroup MGMT dns-server 192.168.1.5&lt;BR /&gt;vpngroup MGMT wins-server 192.168.1.5&lt;BR /&gt;vpngroup MGMT default-domain xxxxx.com&lt;BR /&gt;vpngroup MGMT split-tunnel mgmt-vpn-client&lt;BR /&gt;vpngroup MGMT pfs&lt;BR /&gt;vpngroup MGMT idle-time 86400&lt;BR /&gt;vpngroup MGMT password ********&lt;BR /&gt;telnet timeout 2&lt;BR /&gt;ssh SITE1 255.255.255.255 outside&lt;BR /&gt;ssh SITE2 255.255.255.255 outside&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 20&lt;BR /&gt;management-access inside&lt;BR /&gt;console timeout 2&lt;BR /&gt;dhcpd address 192.168.1.10-192.168.1.99 inside&lt;BR /&gt;dhcpd address 192.168.3.101-192.168.3.199 dmz2&lt;BR /&gt;dhcpd dns 24.25.5.60 24.25.5.61&lt;BR /&gt;dhcpd lease 3600&lt;BR /&gt;dhcpd ping_timeout 750&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;dhcpd enable dmz2&lt;BR /&gt;username admin encrypted privilege 15&lt;BR /&gt;username site encrypted privilege 15&lt;BR /&gt;terminal width 80&lt;BR /&gt;banner exec * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *&lt;BR /&gt;banner exec * &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; *&lt;BR /&gt;banner exec * [WARNING] XXXX-PIX &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;*&lt;BR /&gt;: end&lt;BR /&gt;XXXX-PIX#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Apr 2014 12:10:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432016#M267420</guid>
      <dc:creator>mppflanigan</dc:creator>
      <dc:date>2014-04-18T12:10:15Z</dc:date>
    </item>
    <item>
      <title>Can anyone offer assistance</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432017#M267421</link>
      <description>&lt;P&gt;Can anyone offer assistance&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2014 14:01:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432017#M267421</guid>
      <dc:creator>mppflanigan</dc:creator>
      <dc:date>2014-04-24T14:01:24Z</dc:date>
    </item>
    <item>
      <title>You should be able to add</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432018#M267422</link>
      <description>&lt;P&gt;You should be able to add multiple static statements using the same IP as long as you specify the ports ie.&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp x.x.x.x &amp;lt;port num&amp;gt; 192.168.1.23 &amp;lt;port num&amp;gt;&lt;/P&gt;&lt;P&gt;what is x.x.x.x ? No need to post the actual IP but is it the IP assigned to the outside interface or another one.&lt;/P&gt;&lt;P&gt;If it is another one is that IP part of a range being routed to your firewall ?&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2014 18:32:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432018#M267422</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-04-24T18:32:22Z</dc:date>
    </item>
    <item>
      <title>I have added the following</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432019#M267423</link>
      <description>&lt;P&gt;I have added the following with no luck.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp xxx.xxx.xxx.xxx 8200 192.168.1.13 8200 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) udp xxx.xxx.xxx.xxx 8200 192.168.1.13 8200 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp xxx.xxx.xxx.xxx 8016 192.168.1.13 8016 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) udp xxx.xxx.xxx.xxx 8016 192.168.1.13 8016 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp xxx.xxx.xxx.xxx 8116 192.168.1.13 8116 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) udp xxx.xxx.xxx.xxx 8116 192.168.1.13 8116 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp xxx.xxx.xxx.xxx 10019 192.168.1.13 10019 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) udp xxx.xxx.xxx.xxx 10019 192.168.1.13 10019 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list dvr_in permit tcp xxx.xxx.xxx.xxx outside eq 8200&lt;BR /&gt;access-list dvr_in permit tcp xxx.xxx.xxx.xxx outside eq 8016&lt;BR /&gt;access-list dvr_in permit tcp xxx.xxx.xxx.xxx outside eq 8116&lt;BR /&gt;access-list dvr_in permit tcp xxx.xxx.xxx.xxx outside eq 10019&lt;BR /&gt;access-list dvr_in permit udp xxx.xxx.xxx.xxx outside eq 8200&lt;BR /&gt;access-list dvr_in permit udp xxx.xxx.xxx.xxx outside eq 8016&lt;BR /&gt;access-list dvr_in permit udp xxx.xxx.xxx.xxx outside eq 8116&lt;BR /&gt;access-list dvr_in permit udp xxx.xxx.xxx.xxx outside eq 10019&lt;BR /&gt;access-group dvr_in in xxx.xxx.xxx.xxx outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think there may be a rule preventing the above from working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1 (the IP is the outside interface static IP and that is the only route rule)&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 12:51:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432019#M267423</guid>
      <dc:creator>mppflanigan</dc:creator>
      <dc:date>2014-04-25T12:51:32Z</dc:date>
    </item>
    <item>
      <title>Your acl looks wrong although</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432020#M267424</link>
      <description>&lt;P&gt;Your acl looks wrong although it's difficult to say because all the IPs are hidden&lt;/P&gt;&lt;P&gt;In your static statements what public IP have you used ? No need to post the actual IP but is it the outside interface IP or is it a different IP ?&lt;/P&gt;&lt;P&gt;Who should have access to the camera DVR from outside ie. are they specific IPs or could it be any IP ?&lt;/P&gt;&lt;P&gt;Can you answer both of the above please.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 13:44:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432020#M267424</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-04-25T13:44:22Z</dc:date>
    </item>
    <item>
      <title>The xxx IP is only my outside</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432021#M267425</link>
      <description>&lt;P&gt;The xxx IP is only my outside static public IP. The DVR is static 192.168.1.13.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the help&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 14:12:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432021#M267425</guid>
      <dc:creator>mppflanigan</dc:creator>
      <dc:date>2014-04-25T14:12:28Z</dc:date>
    </item>
    <item>
      <title>So just to clarify -the xxx</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432022#M267427</link>
      <description>&lt;P&gt;So just to clarify -&lt;/P&gt;&lt;P&gt;the xxx IP is the IP assigned to the outside interface ?&lt;/P&gt;&lt;P&gt;Can you also answer the second question i asked ie. which IPs should have access to it from the internet ?&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 14:15:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432022#M267427</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-04-25T14:15:49Z</dc:date>
    </item>
    <item>
      <title>Yes the xxx IP is the IP</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432023#M267429</link>
      <description>&lt;P&gt;Yes the xxx IP is the IP assigned to the outside interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Second question; I need various IPs to access it so management can access the DVR from home/phones etc...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 14:33:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432023#M267429</guid>
      <dc:creator>mppflanigan</dc:creator>
      <dc:date>2014-04-25T14:33:31Z</dc:date>
    </item>
    <item>
      <title>Your acl should look like</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432024#M267430</link>
      <description>&lt;P&gt;Your acl should look like -&lt;/P&gt;&lt;P&gt;access-list dvr_in permit tcp host &amp;lt;source IP&amp;gt; host &amp;lt;outside interface IP&amp;gt; eq &amp;lt;port num&amp;gt;&lt;/P&gt;&lt;P&gt;and you would need a line for each source IP and port combination.&lt;/P&gt;&lt;P&gt;then to apply it -&lt;/P&gt;&lt;P&gt;access-group dvr_in in interface outside&lt;/P&gt;&lt;P&gt;is this what you have done ?&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 14:38:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432024#M267430</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-04-25T14:38:01Z</dc:date>
    </item>
    <item>
      <title>I have used what is above and</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432025#M267431</link>
      <description>&lt;P&gt;I have used what is above and also other variations including;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list dvr permit tcp any xxx.xxx.xxx.xxx outside eq 8200&lt;BR /&gt;access-list dvr permit tcp any xxx.xxx.xxx.xxx outside eq 8016&lt;BR /&gt;access-list dvr permit tcp any xxx.xxx.xxx.xxx outside eq 8116&lt;BR /&gt;access-list dvr permit tcp any xxx.xxx.xxx.xxx outside eq 10019&lt;/P&gt;&lt;P&gt;access-group dvr in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am going to redo the entries in soon and let you know the results.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 15:14:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432025#M267431</guid>
      <dc:creator>mppflanigan</dc:creator>
      <dc:date>2014-04-25T15:14:04Z</dc:date>
    </item>
    <item>
      <title>I changed the DVR IP and</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432026#M267432</link>
      <description>&lt;P&gt;ETA; it is working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I changed the DVR IP and added: (xxx.xxx.xxx.xxx) is the outside interface IP.&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp xxx.xxx.xxx.xxx 8200 192.168.1.52 8200 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) udp xxx.xxx.xxx.xxx 8200 192.168.1.52 8200 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp xxx.xxx.xxx.xxx 8016 192.168.1.52 8016 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) udp xxx.xxx.xxx.xxx 8016 192.168.1.52 8016 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp xxx.xxx.xxx.xxx 8116 192.168.1.52 8116 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) udp xxx.xxx.xxx.xxx 8116 192.168.1.52 8116 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp xxx.xxx.xxx.xxx 10019 192.168.1.52 10019 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) udp xxx.xxx.xxx.xxx 10019 192.168.1.52 10019 netmask 255.255.255.255&lt;BR /&gt;access-list dvr_in permit tcp any host xxx.xxx.xxx.xxx eq 8200&lt;BR /&gt;access-list dvr_in permit tcp any host xxx.xxx.xxx.xxx eq 8016&lt;BR /&gt;access-list dvr_in permit tcp any host xxx.xxx.xxx.xxx eq 8116&lt;BR /&gt;access-list dvr_in permit tcp any host xxx.xxx.xxx.xxx eq 1019&lt;BR /&gt;access-group dvr_in in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was sure I added it correctly before. Maybe not. (I know thw private IP changed)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the assistance, much appreciated&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 18:35:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-routing-external-to-internal/m-p/2432026#M267432</guid>
      <dc:creator>mppflanigan</dc:creator>
      <dc:date>2014-04-25T18:35:04Z</dc:date>
    </item>
  </channel>
</rss>

